APPLE & BUSINESS. ios ENTERPRISE SECURITY ENTERPRISE NEEDS CONFIGURATION PROFILES

Similar documents
ENTERPRISE SECURITY. ios Security Lecture 5 COMPSCI 702

iphone in Business Mobile Device Management

Deploying iphone and ipad Mobile Device Management

ipad in Business Mobile Device Management

Mobile Device Management ios Policies

Sophos Mobile Control User guide for Apple ios

Managing ios Devices. Andrew Wellington Division of Information The Australian National University XW11

Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com

Deploying iphone and ipad Security Overview

TLC 3 Student Mobile Device Configuration Specifications

How to wipe personal data and from a lost or stolen mobile device

Mobile Device Management AirWatch Enrolment ios Devices (ipad, iphone, ipod) Documentation - End User

Mobile Configuration Profiles for ios Devices Technical Note

Sophos Mobile Control User guide for Apple ios. Product version: 4

Absolute Manage MDM. John Wu Systems Engineer

User Guide. Mobile Device Management. Version 1.0. Published September 2011

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

User Manual for Version Mobile Device Management (MDM) User Manual

Mobile Device Management Solution Hexnode MDM

Telstra Mobile Device Management (T MDM) Getting Started Guide

District 211 Technology. ipad Setup Instructions

ManageEngine Desktop Central. Mobile Device Management User Guide

MDM User Guide June 2012

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Creating an Apple APNS Certificate

eschoolpad for ipad INSTALLATION GUIDE v3.0 Prepared by: Avrio Solutions Company Limited

1:1 ipad Program Device Setup Guide

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

Vodafone Secure Device Manager Administration User Guide

Introduction...3. Creating an Apple ID...3. Setting Up Your ipad...4. Connecting to Genesis...4. Setting Up Your ipad...5. ipad Name Change...

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

company policies are adhered to and all parties (traders,

Managing Mobility. 10 top tips for Enterprise Mobility Management

Apple Configurator MDM Site - Review

ipad Set Up Guide: Staff! 1 of! 20

Introduction to AirWatch and Configurator

Mobile Device Management (MDM) Policies

How to Obtain an APNs Certificate for CA MDM

ios Enterprise Deployment Overview

Building Apps for iphone and ipad. Presented by Ryan Hope, Sumeet Singh

Mobile Iron User Guide

ios How to Back Up from icloud

Ensuring the security of your mobile business intelligence

QuickStart Guide for Mobile Device Management

Deploying iphone and ipad Apple Configurator

ipad in Business Security

iphone in Business How-To Setup Guide for Users

MC3WAVES Wireless Connection Wizard

iphone in Business Security Overview

QuickStart Guide for Mobile Device Management. Version 8.6

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

The software and tools we use to deploy our ipads

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

Mobile Device Management (MDM) Policies. Best Practices Guide.

Bell Mobile Device Management (MDM)

Getting Started - MDM Setup

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback -

PMDP is simple to set up, start using, and maintain

Students Mobile Messaging Registration & Configuration

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Advanced Configuration Steps

itunes: About ios backups

Sophos Mobile Control Startup guide. Product version: 3

Phone: Fax: Box: 230

Sophos Mobile Control Startup guide. Product version: 3.5

Health Science Center AirWatch Installation and Enrollment Instructions For Apple ios 8 Devices

Rocket Mail Smartphone Configuration Guide. Version 2.0

Setting Up groov Mobile Apps. Introduction. Setting Up groov Mobile Apps. Using the ios Mobile App

Guidance End User Devices Security Guidance: Apple ios 7

Thank you for using Synapse Hosted Exchange service. Please find the instructions for setting up your clients are below:

Mobility Manager 9.5. Users Guide

Dacorum U3A Apple Mac Users Group Agenda TUESDAY 7th July 2015 Time Machine Backups for your MAC & ipad?

Mobile Device Management

Connect for iphone. Aug, 2012 Ver 5.3b AWest. 1 P age

Networking & Internet: Enterprise Deployment

Symantec Mobile Management 7.2 SP3 MR1 Release Notes

BYOD Guidance: BlackBerry Secure Work Space

Managing OS X with Configuration Profiles

Rockets Smartphone Configuration. Spring 2012 Edition

Cloud Services MDM. ios User Guide

Wireless LAN Client Configuration Guide for Apple iphone

End User Devices Security Guidance: Apple ios 8

Salmon Group, Inc. An 8(a) Certified, Veteran owned company

Guide for Generating. Apple Push Notification Service Certificate

Prerequisites Guide for ios

Mobile Device Management and Security Glossary

Systems Manager Cloud Based Mobile Device Management

Why you need. McAfee. Multi Acess PARTNER SERVICES

Kaspersky Security 10 for Mobile Implementation Guide

End User Devices Security Guidance: Apple OS X 10.10

Transcription:

APPLE & BUSINESS ios ENTERPRISE SECURITY Apple have had an uphill battle getting into businesses for many years the Windows monopoly Phones provided another attempt Blackberrys and Windows Mobile were the rulers Need integration with Microsoft Exchange Server 1 2 ENTERPRISE NEEDS CONFIGURATION PROFILES Control over devices which access or store sensitive data Used to buy and set up devices for employees apply rules unable to install other programs strong passcodes remote lock remote wipe Centralised management updates and changes made from the organisation If BYOD there are extra problems users want to do things with their devices which may be unsafe installing 3rd party programs update programs without permission Used to manage the devices Administrator configures the settings many of the settings are the same you ordinarily see under Settings there is an iphone Configuration Utility (Mac or Windows) Can be installed over USB Sent via email Or hosted on a web server 3 4

MOBILE DEVICE MANAGEMENT (MDM) SYSTEM CONFIGURATION PROFILES Server used to manage a large number of devices Apple provides one in Server editions of Mac OSX up to medium sized organizations 3rd party solutions as well Another property list May be signed and encrypted (Cryptographic Message Syntax CMS) if sent over a network then should be encrypted Includes name and description of the profile creating organization a number of payloads these have the configuration data 5 6 CONFIGURATION PAYLOADS Removal password the password needed to turn off the configuration profile configurations can also be set with Never remove - have to clear the device to get rid of it Passcode policy is a passcode mandatory and how complex should it be (see figure 2.2) if there is no existing passcode or the existing one is not complex enough then the user is asked to set a new passcode (how does the policy know? I would have thought the existing passcode was only stored encrypted.) from ios Hacker s Handbook 7 8

email configures the user s email account Exchange configures the user s Microsoft Exchange account VPN specifies a VPN WiFi specifies a WiFi network APN specifies a particular mobile carrier web clip puts a web clipping on the home screen restrictions camera app store Siri YouTube Safari etc DISTRIBUTING THE PROFILES WITH THE IPHONE CONFIGURATION UTILITY Puts a root certificate authority in the keychain Each device connected over USB has its certificate created this certificate is then used to encrypt/decrypt the profiles can then use email or the web to send profiles 9 10 DISTRIBUTING VIA MOBILE DEVICE MANAGEMENT HOW MDM WORKS 3 components ios device organization s MDM server Apple s Push Notification Service (APNS) from ios Hacker s Handbook The MDM server tells the APNS to publish a notification (on a particular topic) devices have informed the APNS which topics they are subscribing to The notification is sent The device then establishes a connection to the MDM server over HTTPS Remote wiping can be initiated by MDM, Exchange, or icloud. 11 12

ENTERPRISE APPS THE KILL SWITCH & HARDWARE MODIFICATIONS An enterprise provisioning profile can be loaded along with the configuration profile then the in-house enterprise apps can be distributed over the air or through MDM enterprise provisioning profiles have to be renewed annually The kill switch worries some companies what if Apple wants to shut our apps down? Some companies don t trust software restrictions rather than rely on configuration profiles to turn cameras off etc. e.g. companies can purchase ipads without cameras or wifi 13 14 THE PASSCODE BYPASS BUG SUMMARY http://www.macrumors.com/2013/02/14/ios-6-1-bug-enables-bypassing-passcode-lock-to-access-phone-and-contacts/ February 2012 - ios 6.1 1. Lock device 2. Slide to unlock 3. Tap emergency call 4. Hold sleep button until the power down prompt shows. Click cancel, you will notice the status bar turn blue. Type in 911 or your emergency number and click call then cancel it asap so the call dosen t go through. 5. Lock your device with the sleep button then turn it on using the home button. 6. Slide to unlock then hold the sleep button and in 3 seconds tap emergency call. This will spazz out the phone and cause it to open. [Make sure to continuously hold the sleep button until you are done looking in the phone] It only provided access to the phone function Enterprises need to have control over devices which connect to their systems Configuration profiles can be installed on devices to enforce policies and manage restrictions These can be distributed via MDM systems 15 16

RESOURCE A good place to get an overview of all the topics I have covered so far http://www.apple.com/iphone/business/it-center/security.html also look at the links on this page 17